System Control Computer Sample Clauses

System Control Computer. The system control computer is a PC-based computer used by operators to control the system. How users interact with the control computer depends on the mode of operation: • [***] The control computer houses two custom PCI boards used for system control; these boards are discussed in the following section. The activities related to the System Control Computer include the following: • [***]
AutoNDA by SimpleDocs

Related to System Control Computer

  • Computers All computers, hardware, software, computer upgrades and maintenance in connection therewith shall be at Owner's expense.

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

  • Data Input Control It will be possible to retrospectively examine and establish whether and by whom Personal Data have been entered, modified or removed from SAP data processing systems.

  • COMMERCIAL COMPUTER SOFTWARE If performance involves acquisition of existing computer software, the following Company Exhibit is incorporated by reference: CCS Commercial Computer Software License (Company – July 2010).

  • Job Control Personal Data being processed on commission (i.e., Personal Data processed on a customer’s behalf) is processed solely in accordance with the Agreement and related instructions of the customer.

  • Employment Eligibility Verification As required by IC § 22-5-1.7, the Contractor swears or affirms under the penalties of perjury that the Contractor does not knowingly employ an unauthorized alien. The Contractor further agrees that: A. The Contractor shall enroll in and verify the work eligibility status of all his/her/its newly hired employees through the E-Verify program as defined in IC § 22-5-1.7-3. The Contractor is not required to participate should the E-Verify program cease to exist. Additionally, the Contractor is not required to participate if the Contractor is self-employed and does not employ any employees. B. The Contractor shall not knowingly employ or contract with an unauthorized alien. The Contractor shall not retain an employee or contract with a person that the Contractor subsequently learns is an unauthorized alien. C. The Contractor shall require his/her/its subcontractors, who perform work under this Contract, to certify to the Contractor that the subcontractor does not knowingly employ or contract with an unauthorized alien and that the subcontractor has enrolled and is participating in the E-Verify program. The Contractor agrees to maintain this certification throughout the duration of the term of a contract with a subcontractor. The State may terminate for default if the Contractor fails to cure a breach of this provision no later than thirty (30) days after being notified by the State.

  • Computer Tape The computer tape regarding the Receivables made available by the Seller to the Depositor is complete and accurate in all respects as of the Transfer Date.

  • Computer The Contractor shall maintain at its office for its use a computer with, at a minimum, a 1 GHz processor and an internet connection. The Contractor shall maintain individual email accounts for each of its project managers.

  • Computer Systems (a) Servicer to operate systems (b) Servicer to maintain back-up facilities (c) Servicer to notify location of computer tapes

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!